Breaking the Cyber-Security Dilemma: Aligning Security Needs and Removing Vulnerabilities

Science and Engineering Ethics 20 (3):701-715 (2014)

Abstract
Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and “its” security crowds out consideration for the security of the individual citizen, with detrimental effects on the security of the whole system. The threat arising from cyberspace to (national) security is presented as possible disruption to a specific way of life, one building on information technologies and critical functions of infrastructures, with relatively little consideration for humans directly. This non-focus on people makes it easier for state actors to militarize cyber-security and (re-)assert their power in cyberspace, thereby overriding the different security needs of human beings in that space. Paradoxically, the use of cyberspace as a tool for national security, both in the dimension of war fighting and the dimension of mass-surveillance, has detrimental effects on the level of cyber-security globally. A solution out of this dilemma is a cyber-security policy that is decidedly anti-vulnerability and at the same time based on strong considerations for privacy and data protection. Such a security would have to be informed by an ethics of the infosphere that is based on the dignity of information related to human beings
Keywords Cyber-security  Human security  Surveillance  Information ethics
Categories No categories specified
(categorize this paper)
ISBN(s)
DOI 10.1007/s11948-014-9551-y
Options
Edit this record
Mark as duplicate
Export citation
Find it on Scholar
Request removal from index
Revision history

Download options

Our Archive


Upload a copy of this paper     Check publisher's policy     Papers currently archived: 47,149
External links

Setup an account with your affiliations in order to access resources via your University's proxy server
Configure custom proxy (use this if your affiliation does not provide a proxy)
Through your library

References found in this work BETA

The Ethics of Cyberwarfare.Randall R. Dipert - 2010 - Journal of Military Ethics 9 (4):384-410.
Artificial Evil and the Foundation of Computer Ethics.Luciano Floridi & J. W. Sanders - 2001 - Ethics and Information Technology 3 (1):55-66.
Towards an Ontological Foundation of Information Ethics.Rafael Capurro - 2006 - Ethics and Information Technology 8 (4):175-186.

View all 6 references / Add more references

Citations of this work BETA

Toward a Human-Centric Approach to Cybersecurity.Ronald J. Deibert - 2018 - Ethics and International Affairs 32 (4):411-424.

Add more citations

Similar books and articles

Where Computer Security Meets National Security.Helen Nissenbaum - 2005 - Ethics and Information Technology 7 (2):61-73.
Security: Against What? For What? With What?André Gorz - 1983 - Telos: Critical Theory of the Contemporary 1983 (58):158-168.
Reve{a,I}Ling the Risks.Wolter Pieters - 2010 - Techne 14 (3):194-206.
Online Security: What’s in a Name? [REVIEW]Anat Biletzki - 2013 - Philosophy and Technology 26 (4):397-410.
The Transhuman Security Dilemma.Daniel McIntosh - 2010 - Journal of Evolution and Technology 21 (2):32-48.
Security, Knowledge and Well-Being.Stephen John - 2011 - Journal of Moral Philosophy 8 (1):68-91.
The Fascist Moment: Security, Exclusion, Extermination.Mark Neocleous - 2009 - Studies in Social Justice 3 (1):23-37.

Analytics

Added to PP index
2014-04-30

Total views
29 ( #324,130 of 2,289,437 )

Recent downloads (6 months)
1 ( #840,769 of 2,289,437 )

How can I increase my downloads?

Downloads

My notes

Sign in to use this feature